CYberskills – Cyber career Roadshow
Fall 2022 | 4 Universities| AAU-CPH | CBS | AU | SDU
This coming fall you can meet us at one of the 4 Universities, who are part of our “cyber roadshow”
Our goal is to let you explore if a career in cyber security could be an interesting path for you!
Cyber Security – Let’s show you why it might be an interesting career path for you!
Pursuing a career in cyber security means joining a booming industry where available jobs outnumber qualified candidates. People working with security have a range of different backgrounds and educations. Yet, they all have one thing in common, they think cyber security is fun, challenging and exciting to work with – and we want to show that to you!
In cooperation with Microsoft, IDA, ICY Security, IT-Vest and CyberSkills – we have created a small roadshow across 4 universities to spread the word about cyber security (AU, AAU-CPH, CBS & SDU)!
It’s the same 2,5 hours program for all of the 4 events – you just have to sign up for the right location through the boxes below.
If you can’t wait on getting wiser on the topic, you can also dive into a line of our rolemodels, and watch our 3 cyber security modules, then you get all the right fundamentals in place 😉
Join our CyberSkills career event in the Fall
Throughout the 2,5 hours event, we want you that cyber security is fun, challenging and exciting to work with. It’s the same event at 4 different universities with different speakers, and we hope that you will join!
The event will show you:
- What skills are needed to do a career in cyber?
- Give you insights on different career paths within the field
- Hands-on experience through small workshops learning the basics
We will host 2 workshops (running parallel), and you have to choose whether you want to join the “technical” or “privacy” oriented.
The event will give you the opportunity to talk and network with like-minded peers and the companies we have engaged!
So come join us at one of the 4 universities, and maybe you will find out that you should pursue a career in cyber security as well.
Arrival & Registration
By our Host of the day Linda M. Pedersen, Partner, Happy42
By Microsoft: Why diversity is our strongest defense in cybersecurity?
Career Pep Talks
We have invited a graduate to talk about how they have experienced the career path in cyber security – and why we reccomend you to do the same!
Workshop Intro: Personal threat modelling: How to mitigate risks hosted by Microsoft (AU / AAU-CPH / SDU / CBS)
In this workshop you will learn how to threat model, by creating threat a model for you!
Workshop Intro: How to Put a Hacker in a Leg-log hosted by ICY (AU // AAU-CPH)
Get ready for a wicked cocktail of hacker attacks, Pandora’s Box, real life cyber-crime case
Workshop Intro: How to work with Privacy and IAM by VENZO (SDU // CBS)
Get ready for a fly-in on how you work with privacy from a cyber security perspective.
You need to choose one of the 2 workshops, that you would like to attend!
Your time to choose which one you want to attend! Please note that Microsoft will host workshop at all 4 places, ICY will host their workshop at AU and AAU-CPH and VENZO will then host at SDU and CBS. So you can choose between 2 no matter what location 🙂
Common for all, is that it will be low-key workshopa that focuses on fundamentals within the given topic (70 minutes)! We make sure that everyone is comfortable in the setting 🙂
End of workshop, networking & round off
Thank you for attending!
Personal threat modelling: How to mitigate risks
Hosted by Microsoft
(AU | AAU-CPH | SDU| CBS)
Threat modeling is one of the most important tools used by security and software development teams across the world. It enables those teams to identify, and mitigate, threats to the systems and data they are protecting. In this workshop you will learn how to threat model, by creating threat a model for you!
We will show you how to identify your most important assets – e.g., your money, your reputation, your pictures, your safety – then show you how to improve the security of these assets using threat modelling to generate a list of prioritized risks and a mitigations.
How to Put a Hacker
in a Leg-log
Hosted by ICY
(AU | AAU-CPH)
Get ready for a wicked cocktail of hacker attacks, Pandora’s Box, real life cyber-crime case and a Kahoot quiz with a chance to win cool prizes.
On this workshop we have one goal: To show how you – together with all of us here at ICY Security – can help making life miserable for the increasing number of criminals, roaming in cyberspace.
So, buckle up and experience first-hand, how our ethical hacker will go after valuable data and then show you, how to shut down the attack with force!
Hosted by VENZO_cyber security
(SDU | CBS)
Full description will be announced soon.
Linda M. Pedersen
Partner Happy 42
Peter Melsted Hansen
Principal Consultant & Ethical Hacker
Jesper Bak Engel
Senior Consultant & Product Manager
Senior Privacy Manager
Cloud Security Architecht
Principal Security Program Manager
Student, MS Datalogi, SDU
Team Member at Kalmarunionen
Mogens Hede Villumsen
Cloud Security Consultant
Identity and Access Management Student Assistant
Hjortur Palmi Palsson
Senior Software Engineer